openSUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0257-1
Rating: important
References: #1077291
Cross-References: CVE-2018-5089 CVE-2018-5095 CVE-2018-5096
CVE-2018-5097 CVE-2018-5098 CVE-2018-5099
CVE-2018-5102 CVE-2018-5103 CVE-2018-5104
CVE-2018-5117
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for MozillaThunderbird to version 52.6 fixes several issues.
These security issues were fixed:
- CVE-2018-5095: Integer overflow in Skia library during edge builder
allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during
XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements
(bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation
(bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned
left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
These security issues were fixed:
- Searching message bodies of messages in local folders, including filter
and quick filter operations, not working reliably: Content not found in
base64-encode message parts, non-ASCII text not found and false
positives found.
- Defective messages (without at least one expected header) not shown in
IMAP folders but shown on mobile devices
- Calendar: Unintended task deletion if numlock is enabled
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-101=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (x86_64):
MozillaThunderbird-52.6-56.2
MozillaThunderbird-buildsymbols-52.6-56.2
MozillaThunderbird-debuginfo-52.6-56.2
MozillaThunderbird-debugsource-52.6-56.2
MozillaThunderbird-devel-52.6-56.2
MozillaThunderbird-translations-common-52.6-56.2
MozillaThunderbird-translations-other-52.6-56.2
- openSUSE Leap 42.3 (i586):
MozillaThunderbird-52.6-56.1
MozillaThunderbird-buildsymbols-52.6-56.1
MozillaThunderbird-debuginfo-52.6-56.1
MozillaThunderbird-debugsource-52.6-56.1
MozillaThunderbird-devel-52.6-56.1
MozillaThunderbird-translations-common-52.6-56.1
MozillaThunderbird-translations-other-52.6-56.1
References:
https://www.suse.com/security/cve/CVE-2018-5089.htmlhttps://www.suse.com/security/cve/CVE-2018-5095.htmlhttps://www.suse.com/security/cve/CVE-2018-5096.htmlhttps://www.suse.com/security/cve/CVE-2018-5097.htmlhttps://www.suse.com/security/cve/CVE-2018-5098.htmlhttps://www.suse.com/security/cve/CVE-2018-5099.htmlhttps://www.suse.com/security/cve/CVE-2018-5102.htmlhttps://www.suse.com/security/cve/CVE-2018-5103.htmlhttps://www.suse.com/security/cve/CVE-2018-5104.htmlhttps://www.suse.com/security/cve/CVE-2018-5117.htmlhttps://bugzilla.suse.com/1077291
openSUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0256-1
Rating: important
References: #1077291
Cross-References: CVE-2018-5089 CVE-2018-5095 CVE-2018-5096
CVE-2018-5097 CVE-2018-5098 CVE-2018-5099
CVE-2018-5102 CVE-2018-5103 CVE-2018-5104
CVE-2018-5117
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for MozillaThunderbird to version 52.6 fixes several issues.
These security issues were fixed:
- CVE-2018-5095: Integer overflow in Skia library during edge builder
allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during
XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements
(bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation
(bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned
left-to-right (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).
These security issues were fixed:
- Searching message bodies of messages in local folders, including filter
and quick filter operations, not working reliably: Content not found in
base64-encode message parts, non-ASCII text not found and false
positives found.
- Defective messages (without at least one expected header) not shown in
IMAP folders but shown on mobile devices
- Calendar: Unintended task deletion if numlock is enabled
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2018-101=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):
MozillaThunderbird-52.6-54.1
MozillaThunderbird-buildsymbols-52.6-54.1
MozillaThunderbird-debuginfo-52.6-54.1
MozillaThunderbird-debugsource-52.6-54.1
MozillaThunderbird-devel-52.6-54.1
MozillaThunderbird-translations-common-52.6-54.1
MozillaThunderbird-translations-other-52.6-54.1
References:
https://www.suse.com/security/cve/CVE-2018-5089.htmlhttps://www.suse.com/security/cve/CVE-2018-5095.htmlhttps://www.suse.com/security/cve/CVE-2018-5096.htmlhttps://www.suse.com/security/cve/CVE-2018-5097.htmlhttps://www.suse.com/security/cve/CVE-2018-5098.htmlhttps://www.suse.com/security/cve/CVE-2018-5099.htmlhttps://www.suse.com/security/cve/CVE-2018-5102.htmlhttps://www.suse.com/security/cve/CVE-2018-5103.htmlhttps://www.suse.com/security/cve/CVE-2018-5104.htmlhttps://www.suse.com/security/cve/CVE-2018-5117.htmlhttps://bugzilla.suse.com/1077291
openSUSE Recommended Update: Recommended update for release-notes-openSUSE
______________________________________________________________________________
Announcement ID: openSUSE-RU-2018:0247-1
Rating: low
References: #1077656
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for release-notes-openSUSE adds an end-of-life note to the
release notes.
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2018-100=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (noarch):
release-notes-openSUSE-42.2.20180124-5.6.1
References:
https://bugzilla.suse.com/1077656
openSUSE Security Update: Security update for curl
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0236-1
Rating: moderate
References: #1077001
Cross-References: CVE-2018-1000007
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for curl fixes one issues.
This security issue was fixed:
- CVE-2018-1000007: Prevent leaking authentication data to third parties
when following redirects (bsc#1077001)
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-98=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2018-98=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
curl-7.37.0-30.1
curl-debuginfo-7.37.0-30.1
curl-debugsource-7.37.0-30.1
libcurl-devel-7.37.0-30.1
libcurl4-7.37.0-30.1
libcurl4-debuginfo-7.37.0-30.1
- openSUSE Leap 42.3 (x86_64):
libcurl-devel-32bit-7.37.0-30.1
libcurl4-32bit-7.37.0-30.1
libcurl4-debuginfo-32bit-7.37.0-30.1
- openSUSE Leap 42.2 (i586 x86_64):
curl-7.37.0-16.15.1
curl-debuginfo-7.37.0-16.15.1
curl-debugsource-7.37.0-16.15.1
libcurl-devel-7.37.0-16.15.1
libcurl4-7.37.0-16.15.1
libcurl4-debuginfo-7.37.0-16.15.1
- openSUSE Leap 42.2 (x86_64):
libcurl-devel-32bit-7.37.0-16.15.1
libcurl4-32bit-7.37.0-16.15.1
libcurl4-debuginfo-32bit-7.37.0-16.15.1
References:
https://www.suse.com/security/cve/CVE-2018-1000007.htmlhttps://bugzilla.suse.com/1077001
openSUSE Security Update: Security update for newsbeuter
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0229-1
Rating: important
References: #1059057
Cross-References: CVE-2017-14500
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for newsbeuter fixes one issues.
This security issue was fixed:
- CVE-2017-14500: Improper Neutralization of special elements allowed
remote attackers to perform user-assisted code execution by crafting an
RSS item with a media enclosure that includes shell metacharacters in
its filename (bsc#1059057).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-92=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2018-92=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (x86_64):
newsbeuter-2.9-8.1
newsbeuter-debuginfo-2.9-8.1
newsbeuter-debugsource-2.9-8.1
- openSUSE Leap 42.3 (noarch):
newsbeuter-lang-2.9-8.1
- openSUSE Leap 42.2 (noarch):
newsbeuter-lang-2.9-2.6.1
- openSUSE Leap 42.2 (x86_64):
newsbeuter-2.9-2.6.1
newsbeuter-debuginfo-2.9-2.6.1
newsbeuter-debugsource-2.9-2.6.1
References:
https://www.suse.com/security/cve/CVE-2017-14500.htmlhttps://bugzilla.suse.com/1059057
openSUSE Security Update: Security update for redis
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0228-1
Rating: moderate
References: #1061967
Cross-References: CVE-2017-15047
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for redis to version 4.0.6 fixes security issues and bugs.
The following vulnerabilities were fixed:
- CVE-2017-15047: Buffer overflows occurring reading redis.conf
(bsc#1061967)
The following bugs are fixed:
- Several PSYNC2 bugs could cause data corruption
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-93=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2018-93=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
redis-4.0.6-14.1
redis-debuginfo-4.0.6-14.1
redis-debugsource-4.0.6-14.1
- openSUSE Leap 42.2 (i586 x86_64):
redis-4.0.6-8.6.1
redis-debuginfo-4.0.6-8.6.1
redis-debugsource-4.0.6-8.6.1
References:
https://www.suse.com/security/cve/CVE-2017-15047.htmlhttps://bugzilla.suse.com/1061967
openSUSE Security Update: Security update for mupdf
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0227-1
Rating: moderate
References: #1063413 #1064027 #1074116 #1075936 #1077161
Cross-References: CVE-2017-15369 CVE-2017-15587 CVE-2017-17858
CVE-2017-17866 CVE-2018-5686
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes 5 vulnerabilities is now available.
Description:
This update for mupdf to version 1.12.0 fixes several issues.
These security issues were fixed:
- CVE-2018-5686: Prevent infinite loop in pdf_parse_array function because
EOF is not considered. Remote attackers could leverage this
vulnerability to cause a denial of service via a crafted pdf file
(bsc#1075936).
- CVE-2017-15369: The build_filter_chain function in pdf/pdf-stream.c
mishandled a case where a variable may reside in a register, which
allowed remote attackers to cause a denial of service (Fitz fz_drop_imp
use-after-free and application crash) or possibly have unspecified other
impact via a crafted PDF document (bsc#1063413).
- CVE-2017-15587: Prevent integer overflow in pdf_read_new_xref_section
that allowed for DoS (bsc#1064027).
- CVE-2017-17866: Fixed mishandling of length changes when a repair
operation
occured during a clean operation, which allowed remote attackers to
cause a denial of service (buffer overflow and application crash) or
possibly have unspecified other impact via a crafted PDF document
(bsc#1074116).
- CVE-2017-17858: Fixed a heap-based buffer overflow in the
ensure_solid_xref function which allowed a remote attacker to
potentially execute arbitrary code via a crafted PDF file, because xref
subsection object numbers were unrestricted (bsc#1077161).
For non-security changes please refer to the changelog.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-89=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2018-89=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
mupdf-1.12.0-23.1
mupdf-devel-static-1.12.0-23.1
- openSUSE Leap 42.2 (i586 x86_64):
mupdf-1.12.0-13.10.1
mupdf-devel-static-1.12.0-13.10.1
References:
https://www.suse.com/security/cve/CVE-2017-15369.htmlhttps://www.suse.com/security/cve/CVE-2017-15587.htmlhttps://www.suse.com/security/cve/CVE-2017-17858.htmlhttps://www.suse.com/security/cve/CVE-2017-17866.htmlhttps://www.suse.com/security/cve/CVE-2018-5686.htmlhttps://bugzilla.suse.com/1063413https://bugzilla.suse.com/1064027https://bugzilla.suse.com/1074116https://bugzilla.suse.com/1075936https://bugzilla.suse.com/1077161
openSUSE Recommended Update: Recommended update for kmozillahelper
______________________________________________________________________________
Announcement ID: openSUSE-RU-2018:0226-1
Rating: moderate
References: #1067656
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for kmozillahelper fixes the following issues:
- File dialogs could fail to deliver correct results under some
circumstances,
occasionally preventing Thunderbird from saving attachments (boo#1067656)
Patch Instructions:
To install this openSUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-97=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
kmozillahelper-5.0.2-3.1
kmozillahelper-debuginfo-5.0.2-3.1
kmozillahelper-debugsource-5.0.2-3.1
References:
https://bugzilla.suse.com/1067656
openSUSE Security Update: Security update for redis
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:0225-1
Rating: moderate
References: #1061967
Cross-References: CVE-2017-15047
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for redis to version 4.0.6 fixes security issues and bugs.
The following vulnerabilities were fixed:
- CVE-2017-15047: Buffer overflows occurring reading redis.conf
(bsc#1061967)
The following bugs are fixed:
- Several PSYNC2 bugs could cause data corruption
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2018-93=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):
redis-4.0.6-12.1
redis-debuginfo-4.0.6-12.1
redis-debugsource-4.0.6-12.1
References:
https://www.suse.com/security/cve/CVE-2017-15047.htmlhttps://bugzilla.suse.com/1061967